Skip to main content

Showing 1–8 of 8 results for author: Réveillère, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.04258  [pdf, other

    cs.DC

    RAPTEE: Leveraging trusted execution environments for Byzantine-tolerant peer sampling services

    Authors: Matthieu Pigaglio, Joachim Bruneau-Queyreix, David Bromberg, Davide Frey, Etienne Rivière, Laurent Réveillère

    Abstract: Peer sampling is a first-class abstraction used in distributed systems for overlay management and information dissemination. The goal of peer sampling is to continuously build and refresh a partial and local view of the full membership of a dynamic, large-scale distributed system. Malicious nodes under the control of an adversary may aim at being over-represented in the views of correct nodes, inc… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.

  2. Network Services Anomalies in NFV: Survey, Taxonomy, and Verification Methods

    Authors: Moubarak Zoure, Toufik Ahmed, Laurent Réveillère

    Abstract: Network Function Virtualization (NFV) has emerged as a disruptive networking architecture whose galloping evolution is prompting enterprises to outsource network functions to the cloud and ultimately harvest the fruits of cloud computing, including elasticity, pay-as-you-go billing model, and on-demand services provisioning. However, many reluctant enterprises oppose the benefits of this outsourci… ▽ More

    Submitted 4 March, 2022; originally announced March 2022.

    Comments: in IEEE Transactions on Network and Service Management

  3. arXiv:2202.03186  [pdf, other

    cs.DC

    ALDER: Unlocking blockchain performance by multiplexing consensus protocols

    Authors: Kadir Korkmaz, Joachim Bruneau-Queyreix, Sonia Ben Mokthar, Laurent Réveillère

    Abstract: Most of today's online services (e.g., social networks, search engines, market places) are centralized, which is recognized as unsatisfactory by a majority of users for various reasons (e.g., centralized governance, censorship, loss of control over personal data). Blockchain technologies promise a new Web revolution (Web 3.0) through the decentralization of online services. However, one of the key… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Comments: 11 pages, 13 figures. arXiv admin note: text overlap with arXiv:2104.15063

  4. arXiv:2104.15063  [pdf, other

    cs.DC

    Dandelion: multiplexing Byzantine agreements to unlock blockchain performance

    Authors: Kadir Korkmaz, Joachim Bruneau-Queyreix, Sonia Ben Mokthar, Laurent Réveillère

    Abstract: Permissionless blockchain protocols are known to consume an outrageous amount of computing power and suffer from a trade-off between latency and confidence in transaction confirmation. The recently proposed Algorand blockchain protocol employs Byzantine agreements and has shown transaction confirmation latency on the order of seconds. Its strong resilience to Denial-of-Service and Sybil attacks an… ▽ More

    Submitted 30 April, 2021; originally announced April 2021.

  5. arXiv:2001.09991  [pdf, other

    cs.DC cs.OS

    Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

    Authors: Stella Bitchebe, Djob Mvondo, Alain Tchana, Laurent Réveillère, Noël De Palma

    Abstract: Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today's data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on… ▽ More

    Submitted 26 January, 2020; originally announced January 2020.

  6. Anonymous and confidential file sharing over untrusted clouds

    Authors: Stefan Contiu, Sébastien Vaucher, Rafael Pires, Marcelo Pasin, Pascal Felber, Laurent Réveillère

    Abstract: Using public cloud services for storing and sharing confidential data requires end users to cryptographically protect both the data and the access to the data. In some cases, the identity of end users needs to remain confidential against the cloud provider and fellow users accessing the data. As such, the underlying cryptographic access control mechanism needs to ensure the anonymity of both data… ▽ More

    Submitted 6 April, 2020; v1 submitted 15 July, 2019; originally announced July 2019.

    Journal ref: 2019 IEEE 38th Symposium on Reliable Distributed Systems (SRDS), Lyon, France, 2019

  7. IBBE-SGX: Cryptographic Group Access Control using Trusted Execution Environments

    Authors: Stefan Contiu, Rafael Pires, Sébastien Vaucher, Marcelo Pasin, Pascal Felber, Laurent Réveillère

    Abstract: While many cloud storage systems allow users to protect their data by making use of encryption, only few support collaborative editing on that data. A major challenge for enabling such collaboration is the need to enforce cryptographic access control policies in a secure and efficient manner. In this paper, we introduce IBBE-SGX, a new cryptographic access control extension that is efficient both… ▽ More

    Submitted 27 July, 2018; v1 submitted 3 May, 2018; originally announced May 2018.

    Journal ref: 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018)

  8. arXiv:0704.1373  [pdf, ps, other

    cs.PL

    A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    Authors: Burgy Laurent, Laurent Réveillère, Julia Lawall, Gilles Muller

    Abstract: The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain-specific language, Zebu, for describing protocol message formats and related processing constraints. Fro… ▽ More

    Submitted 11 April, 2007; originally announced April 2007.